Skip to content

Securing Cloud Computing Environment: The Role of JML Process


Does your organisation have a well-implemented and effective JML process that incorporates steps for protecting your cloud computing environment?


A Joiners, Movers, and Leavers (JML) process is essential for protecting your cloud computing environment. This is especially important where you have an employee who has been terminated. 

If a former employee still has access to her former employers cloud computing environment, s/he could potentially disrupt operations, steal data, or maybe even bring the house down!

Here are a few things you should do immediately to protect your cloud computing environment:

- Immediately disable the terminated employee's cloud service accounts (e.g., AWS, Azure, Google Cloud Platform)
- Revoke any API keys, access tokens, or session tokens associated with the employee.
- If using SSO, remove the employee’s access from the SSO provider to ensure they cannot access any linked services.
- Change passwords for any shared accounts that the employee had access to.
- Rotate any SSH keys, API keys, or other authentication keys the employee might have used.

This is what could happen if you don't -> Former Employee deletes servers